Searched refs:IP_MF (Results 1 – 5 of 5) sorted by relevance
105 BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK), in network_stack_utils_attachDhcpFilter()145 BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK), in network_stack_units_attachEgressIgmpReportFilter()188 BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK), in network_stack_units_attachEgressMulticastReportFilter()294 BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK), in network_stack_utils_attachControlPacketFilter()
183 if (frag_off == 0 && (frag_flags & IP_MF) == 0) { in maybe_fill_frag_header()192 if (frag_flags & IP_MF) { in maybe_fill_frag_header()211 frag_off |= IP_MF; in parse_frag_header()
61 if (frag_flags & IP_MF) { in dump_ip()
189 return ntohs(ip->frag_off) & (IP_OFFMASK | IP_MF); in is_ipv4_fragment()365 ip->frag_off &= ~htons(IP_MF); in reassemble_packet()
40 #define IP_MF 0x2000 // Flag: "More Fragments" macro